Remove trailing spaces
parent
111f7d9a88
commit
8461d21658
|
@ -5,7 +5,7 @@ info:
|
|||
author: madrobot
|
||||
severity: critical
|
||||
description: This vulnerability is part of an attack chain that could allow remote code execution on Microsoft Exchange Server. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. Other portions of the chain can be triggered if an attacker already has access or can convince an administrator to open a malicious file. Be aware his CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, and CVE-2021-27078.
|
||||
remediation: Apply the appropriate security update.
|
||||
remediation: Apply the appropriate security update.
|
||||
tags: cve,cve2021,ssrf,rce,exchange,oast,microsoft
|
||||
reference:
|
||||
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855
|
||||
|
|
|
@ -6,7 +6,7 @@ info:
|
|||
severity: critical
|
||||
description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection in the blog archive functionality.
|
||||
tags: cve,cve2021,prestashop,smartblog,sqli
|
||||
remediation: Apply the fix.
|
||||
remediation: Apply the fix.
|
||||
reference:
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37538
|
||||
- https://blog.sorcery.ie/posts/smartblog_sqli/
|
||||
|
|
Loading…
Reference in New Issue